Asynchronous Byzantine Agreement with optimal resilience

被引:0
|
作者
Arpita Patra
Ashish Choudhury
C. Pandu Rangan
机构
[1] University of Bristol,Department of Computer Science
[2] IIT Madras,Department of Computer Science and Engineering
来源
Distributed Computing | 2014年 / 27卷
关键词
Byzantine Agreement; Computationally unbounded; Secret sharing; Common coin;
D O I
暂无
中图分类号
学科分类号
摘要
We present an efficient, optimally-resilient Asynchronous Byzantine Agreement (ABA) protocol involving n=3t+1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n = 3t+1$$\end{document} parties over a completely asynchronous network, tolerating a computationally unbounded Byzantine adversary, capable of corrupting at most t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t$$\end{document} out of the n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n$$\end{document} parties. In comparison with the best known optimally-resilient ABA protocols of Canetti and Rabin (STOC 1993) and Abraham et al. (PODC 2008), our protocol is significantly more efficient in terms of the communication complexity. Our ABA protocol is built on a new statistical asynchronous verifiable secret sharing (AVSS) protocol with optimal resilience. Our AVSS protocol significantly improves the communication complexity of the only known statistical and optimally-resilient AVSS protocol of Canetti et al. Our AVSS protocol is further built on an asynchronous primitive called asynchronous weak commitment (AWC), while the AVSS of Canetti et al. is built on the primitive called asynchronous weak secret sharing (AWSS). We observe that AWC has weaker requirements than AWSS and hence it can be designed more efficiently than AWSS. The common coin primitive is one of the most important building blocks for the construction of an ABA protocol. In this paper, we extend the existing common coin protocol to make it compatible with our new AVSS protocol that shares multiple secrets simultaneously. As a byproduct, our new common coin protocol is more communication efficient than all the existing common coin protocols.
引用
收藏
页码:111 / 146
页数:35
相关论文
共 50 条
  • [41] Random oracles in constantinople: Practical asynchronous Byzantine agreement using cryptography
    Cachin, C
    Kursawe, K
    Shoup, V
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 219 - 246
  • [42] Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited
    Cohen, Ran
    Forghani, Pouyan
    Garay, Juan
    Patel, Rutvik
    Zikas, Vassilis
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 422 - 451
  • [43] Optimal Synchronous Approximate Agreement with Asynchronous Fallback
    Ghinea, Diana
    Liu-Zhang, Chen-Da
    Wattenhofer, Roger
    PROCEEDINGS OF THE 2022 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, PODC 2022, 2022, : 70 - 80
  • [44] Optimal Eventual Byzantine Agreement Protocols with Omission Failures
    Alpturer, Kaya
    Halpern, Joseph Y.
    van der Meyden, Ron
    PROCEEDINGS OF THE 2023 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, PODC 2023, 2023, : 244 - 252
  • [45] An Optimal Solution of Byzantine Agreement in a Scale Free Network
    Yan, K. Q.
    Wang, S. S.
    Wang, S. C.
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 270 - 275
  • [46] Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n2) Communication, and Optimal Resilience
    Abraham, Ittai
    Devadas, Srinivas
    Dolev, Danny
    Nayak, Kartik
    Ren, Ling
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 320 - 334
  • [47] EXTENDING BINARY BYZANTINE AGREEMENT TO MULTIVALUED BYZANTINE AGREEMENT
    TURPIN, R
    COAN, BA
    INFORMATION PROCESSING LETTERS, 1984, 18 (02) : 73 - 76
  • [48] Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults
    Loss, Julian
    Stern, Gilad
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 395 - 421
  • [49] Optimal algorithms for synchronous Byzantine k-set agreement
    Delporte-Gallet, Carole
    Fauconnier, Hugues
    Raynal, Michel
    Safir, Mouna
    THEORETICAL COMPUTER SCIENCE, 2023, 973
  • [50] Optimal Algorithms for Synchronous Byzantine k-Set Agreement
    Delporte-Gallet, Carole
    Fauconnier, Hugues
    Raynal, Michel
    Safir, Mouna
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS (SSS 2022), 2022, 13751 : 178 - 192